


default search action
ProvSec 2010: Malacca, Malaysia
- Swee-Huay Heng, Kaoru Kurosawa:
Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings. Lecture Notes in Computer Science 6402, Springer 2010, ISBN 978-3-642-16279-4
Identification
- Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva:
Improved Zero-Knowledge Identification with Lattices. 1-17 - Hiroaki Anada, Seiko Arita:
Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks. 18-34
Auto Proofs
- David Nowak, Yu Zhang:
A Calculus for Game-Based Security Proofs. 35-52 - Long Ngo, Colin Boyd, Juan Manuel González Nieto:
Automating Computational Proofs for Public-Key-Based Key Exchange. 53-69
Signature I
- Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata:
A Framework for Constructing Convertible Undeniable Signatures. 70-86 - Laila El Aimani:
Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm. 87-101
Hash Function
- Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:
Collision Resistant Double-Length Hashing. 102-118 - Juraj Sarinay:
Interpreting Hash Function Security Proofs. 119-132
Protocol
- Kun Peng, Feng Bao:
Formal and Precise Analysis of Soundness of Several Shuffling Schemes. 133-143 - Thomas Baignères, Pouyan Sepehrdad, Serge Vaudenay:
Distinguishing Distributions Using Chernoff Information. 144-165
Signature II
- Patrick P. Tsang, Man Ho Au
, Joseph K. Liu
, Willy Susilo
, Duncan S. Wong:
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). 166-183 - Keita Emura
, Atsuko Miyaji
, Kazumasa Omote:
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation. 184-198
Invited Talk
- Eike Kiltz:
Cryptographic Protocols from Lattices. 199
Encryption
- Keita Emura
, Atsuko Miyaji
, Kazumasa Omote:
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication. 200-213 - Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa:
Efficient Broadcast Encryption with Personalized Messages. 214-228 - Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
:
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption. 229-243
Signcryption
- S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Public Verifiable Signcryption Scheme. 244-260 - Javier Herranz
, Alexandre Ruiz, Germán Sáez:
Fully Secure Threshold Unsigncryption. 261-278

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.